An ACL-based policy must be configured to allow administrative-user access.

GUI access to the Cisco Secure ASC SE is not supported.

Answer: B,D

Question No: 22

Which two Cisco ISE administration options are available in the Default Posture Status setting? (Choose two.)

Unknown

Compliant

FailOpen

FailClose

Noncompliant

Answer: B,E

Question No: 23

Which profiling capability allows you to gather and forward network packets to an analyzer?

collector

spanner

retriever

aggregator

Answer: A

Question No: 24

Which advanced authentication setting is needed to allow an unknown device to utilize Central WebAuth?

If Authentication failed gt; Continue

If Authentication failed gt; Drop

If user not found gt; Continue

If user not found gt; Reject

Answer: C

Question No: 25

A security engineer has a new TrustSec project and must create a few static security group tag classifications as a proof of concept. Which two classifications can the tags be mapped to? (Choose two.)

VLAN

user ID

interface

switch ID

MAC address

Answer: A,C

Explanation: In static classification the tag maps to some thing (an IP, subnet, VLAN, or interface) rather than relying on an

authorization from the Cisco ISE.

This process of assigning the SGT is defined as “classification.” These classifications are thentransported

deeper into the network for policy enforcement

Question No: 26 CORRECT TEXT

The Secure-X company has started to tested the 802.1X authentication deployment using the Cisco Catalyst 3560-X layer 3 switch and the Cisco ISEvl2 appliance. Each employee desktop will be connected to the 802.1X enabled switch port and will use the Cisco AnyConnect NAM 802.1X supplicant to log in and connect to the network.

Your particular tasks in this simulation are to create a new identity source sequence named AD_internal which will first use the Microsoft Active Directory (AD1) then use the ISE Internal User database. Once the new identity source sequence has been configured, edit the existing DotlX authentication policy to use the new AD_internal identity source sequence.

The Microsoft Active Directory (AD1) identity store has already been successfully configured, you just need to reference it in your configuration.

In addition to the above, you are also tasked to edit the IT users authorization policy so IT users who successfully authenticated will get the permission of the existing IT_Corp authorization profile.

Perform this simulation by accessing the ISE GUI to perform the following tasks:

Create a new identity source sequence named AD_internal to first use the Microsoft Active Directory (AD1) then use the ISE Internal User database

Edit the existing Dot1X authentication policy to use the new AD_internal identity source sequence:

If authentication failed-reject the access request

If user is not found in AD-Drop the request without sending a response

If process failed-Drop the request without sending a response

Edit the IT users authorization policy so IT users who successfully authenticated will get the permission of the existing IT_Corp authorization profile.

To access the ISE GUI, click the ISE icon in the topology diagram. To verify your configurations, from the ISE GUI, you should also see the Authentication Succeeded event for the it1 user after you have successfully defined the DotlX authentication policy to use the Microsoft Active Directory first then use the ISE Internal User Database to authenticate the user. And in the Authentication Succeeded event, you should see the IT_Corp authorization profile being applied to the it1 user. If your configuration is not correct and ISE can#39;t authenticate the user against the Microsoft Active Directory, you should see the Authentication Failed event instead for the it1 user.

Note: If you make a mistake in the Identity Source Sequence configuration, please delete the Identity Source Sequence then re-add a new one. The edit Identity Source Sequence function is not implemented in this simulation.

Answer: Review the explanation for full configuration and solution.

Explanation:

Step 1: create a new identity source sequence named AD_internal which will first use the Microsoft Active Directory (AD1) then use the ISE Internal User database as shown below:

Step 2: Edit the existing Dot1x policy to use the newly created Identity Source:

Then hit Done and save.

Question No: 27

A company wants to allow employees to register and manage their own devices that do not support NSP. Which portals enable this?

MDM portals

Client provisioning portals

My devices portals

BYOD Portals

Answer: C

Question No: 28

Which profiling probe collects the user-agent string?

NetFlow

DHCP

Network Scan

HTTP

Answer: D

Question No: 29

Which two component are required for creating native supplicant profile ?

Operative System

Connection type wired/wireless

Ios Sutten

BYOD

Answer: A,B

Question No: 30

During client provisioning on a Mac OS X system, the client system fails to renew its IP address. Which change can you make to the agent profile to correct the problem?

Enable the Agent IP Refresh feature.

Enable the Enable VLAN Detect Without UI feature.

Enable CRL checking.

Edit the Discovery Host parameter to use an IP address instead of an FQDN.